Skip to main content

23 posts tagged with "Tutorial"

Step-by-step guides and how-to articles

View All Tags

API Gateway Migration Checklist: 15 Zero-Downtime Steps

Β· 22 min read
STOA Team
The STOA Platform Team

Migrating an API gateway is one of the most critical infrastructure changes an organization can make. Done poorly, it causes downtime, broken integrations, and security gaps. Done right, it's invisible to consumers while unlocking new capabilities.

This 15-step checklist ensures zero downtime and zero data loss during your API gateway migration, whether you're moving from webMethods, Kong, Apigee, DataPower, MuleSoft, Oracle OAM, or any other platform.

9-Job CI Security Pipeline: Scanning Every PR Automatically

Β· 14 min read
Christophe Aboulicam
Founder & CTO at HLFH

STOA runs 9 parallel security jobs on every pull request β€” secret scanning, SAST for three languages, dependency audits, container scanning, license compliance, SBOM generation, and commit signature verification. This article breaks down each job, explains what it catches, and shows you how to adopt the same approach in your own projects. This is part of our open-source API gateway philosophy: security scanning should be built into CI, not bolted on after a breach.

API Gateway Hardening: 10-Step Production Checklist

Β· 13 min read
STOA Team
The STOA Platform Team

Running an API gateway in production requires more than deploying with default settings. An insecure gateway exposes every backend service to attack, leaks sensitive data, and creates compliance nightmares. This 10-step security hardening checklist covers the critical controls you need before production deployment. Each step includes concrete configuration examples and verification commands.

Publish Your First API in 5 Minutes (Quick Start)

Β· 9 min read
STOA Team
The STOA Platform Team

STOA Platform is an open-source API gateway designed for the AI era. In this tutorial, you'll go from zero to a working API endpoint in 5 minutes. No complex configuration, no hours reading docs β€” just clone, run, and publish your first API.

By the end, you'll have STOA's full stack running locally: Control Plane, MCP Gateway, Developer Portal, and Console. You'll create an API, expose it through the gateway, and call it like any production endpoint.

AI Agent Authentication: 5 Patterns for Enterprise APIs

Β· 16 min read
STOA Team
The STOA Platform Team

AI agents need programmatic API access, but traditional authentication patterns designed for human users β€” browser cookies, session tokens, OAuth2 authorization code flows β€” don't work. AI agents are autonomous services, not users. They operate without browsers, without human-in-the-loop interactions, and at machine speed. This article presents five authentication patterns that work for AI agents, from the simplest (API keys) to the most secure (mTLS certificate binding), with practical implementation examples for each.

This is part of the What is an MCP Gateway series. For the broader context on why AI agents need specialized infrastructure, see Connecting AI Agents to Enterprise APIs.

AI Factory: How One Developer Ships 72 Story Points/Day

Β· 12 min read
Christophe Aboulicam
Founder & CTO at HLFH

A single developer shipping 72 story points per day across 7 components, 22 PRs per week, with zero regressions on main. This is not a theoretical exercise β€” it is the measured output of STOA Platform's AI Factory during Cycle 7 (February 9-15, 2026). This article explains the architecture, the coordination protocols, and the hard lessons that make it work.

If you are building an MCP gateway or any complex open-source platform, the patterns described here are directly reusable. They are not tied to STOA β€” we extracted them into a reusable pattern library (HEGEMON) that any project can adopt.

Kubernetes API Gateway Patterns: Ingress to MCP (2026)

Β· 15 min read
STOA Team
The STOA Platform Team

Kubernetes-native API gateway patterns have evolved from simple Ingress controllers to sophisticated multi-mode architectures that support AI agents, service mesh integration, and GitOps workflows. This guide covers the four essential patterns β€” Ingress Controller, Gateway API, sidecar gateway, and MCP gateway β€” with architecture diagrams, implementation examples, and a decision framework for choosing the right pattern for your use case.

GitOps in 10 Minutes: Infrastructure as a Git Repo

Β· 8 min read
Christophe Aboulicam
Founder & CTO at HLFH

GitOps means your infrastructure is defined in Git and automatically deployed from it. This guide explains what GitOps is, why it matters for solo devs and small teams, and how to start β€” from versioning config files to full ArgoCD automation.

You know how to git push your code. But what about your infrastructure?

Your Nginx config, your firewall rules, your database credentials, your Kubernetes manifests β€” where do they live? If the answer involves SSH, a shared Wiki page, or "ask Jean-Michel, he set it up" β€” you have a problem.

GitOps means treating infrastructure the same way you treat code: versioned, reviewed, auditable, and automatically deployed from a Git repo. No more SSH. No more "works on my machine." No more mystery configs.

GitOps is a core principle of open-source API management β€” and one of the reasons STOA was designed GitOps-first from day one.

API Security Checklist: 10 Must-Dos for Solo Developers

Β· 10 min read
Christophe Aboulicam
Founder & CTO at HLFH

10 practical security steps that take less than a day and prevent 95% of API incidents. No enterprise budget, no complex tooling β€” just engineering discipline. Covers secrets, rate limiting, CORS, auth, TLS, logging, and dependency management.

You're a freelancer. You shipped an API for a client. It works. Tests pass. Invoice sent.

Six months later, the client calls: someone scraped their entire user database through your API. No rate limiting. No input validation. Default CORS headers. The API key was in the frontend JavaScript.

This happens more often than anyone admits. And it's almost always preventable with a simple checklist. This is part of our open-source API management philosophy: security should be accessible to everyone, not just enterprises.

API Keys in Git History: How to Find and Fix Leaked Secrets

Β· 7 min read
Christophe Aboulicam
Founder & CTO at HLFH

Deleted API keys stay in git history forever. This article shows you how to detect leaked secrets with gitleaks, remove them from history, and prevent future leaks with pre-commit hooks and proper secret management.

You removed the hardcoded API key from your code. You committed the fix. You pushed. You're safe now, right?

No. The key is still in your git history. Anyone with git log -p can find it in seconds.

This isn't a theoretical risk. GitHub scans over 100 million commits per day and finds thousands of valid secrets β€” API keys, database passwords, cloud credentials. Most of them were "removed" by developers who thought deleting the line was enough.

This is one of the most critical security gaps in modern API development β€” and one of the reasons we built STOA as an open-source API gateway with secrets management as a default, not an add-on.